Please turn on your JavaScript for this page to function normally.
Why “Identity” Is Central To IT Security

The increasing demand from our users to provide “Anywhere Access’ to our most sensitive business systems; allowing them to connect from any computing device across …

Scope on Application Vulnerability Description Language

The Application Vulnerability Description Language (AVDL) is a rather new security interoperability standard within the Organization for the Advancement of Structured …

The Spyware Threat And How To Deal With It

Spyware aka advertising-supported software or adware – has been until recently a fairly benign snooper on your surfing habits. The data it gathers is then used to target …

Windows Mobile Pocket PC Security

Seth Fogie, VP of Dallas-based Airscanner Corporation presents the latest in our series of security audio sessions. Mr. Fogie, an expert in the field of mobile computing …

Passwords – Common Attacks and Possible Solutions

Overview Making sure authorized users have access to either sensitive company information or their personal e-mail can be a daunting task, given the fact that an average user …

An IT Manager’s Insight Into Securing Removable Media

When I last looked on the Internet to buy a USB memory stick, I found that for a few hundred pounds I could purchase a 4 gigabyte device the size of a pen. That’s a lot …

Not A Patch On The New Breed Of Cyber-Criminal

The cyber-criminal is getting smarter and more organised and alongside this as have their methods of attack. Whereas 2 years ago the watchword was computer viruses, now new …

RSA Conference Europe 2004 Showcase Video

Here’s a showcase of the RSA Conference Europe 2004 in Barcelona. The video is 3:44 minutes in length, available in Windows Media 9 256K (6.9 MB) and 64K (1.7 MB). Click …

The Rise of Security Threats

The current security threats to business IT infrastructures have increased dramatically. Most notable are the rising number of viruses and similar malicious programs that …

“Shooting the Hostage”: Why Current Generation Intrusion Prevention Systems Fails Business

As a corporate security manager, you are caught between a rock and a hard place. Your networks are under attack at an ever-increasing rate, from viruses, worms and people. The …

The Fedora – Red Hat False Vulnerability Scam

It looks like the “evil minds” have found a new way to use spam for their devious plans. This time spam is combined with a scam that will try to use social …

Understanding E-mail Spoofing

If you receive a snail mail letter, you look to the return address in the top left corner as an indicator of where it originated. However, the sender could write any name and …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools